blob: 9c0cea514b8e5996f8bf35f79547fb9cee45e19f [file] [log] [blame]
Tatiana Bradleyf1409b02023-05-24 14:02:12 -04001id: GO-2021-0107
Damien Neilb5cb7652022-08-18 15:09:12 -07002modules:
Tatiana Bradley82175fd2023-05-31 17:04:08 -04003 - module: github.com/ecnepsnai/web
4 versions:
5 - introduced: 1.4.0
6 fixed: 1.5.2
7 vulnerable_at: 1.5.1
8 packages:
9 - package: github.com/ecnepsnai/web
10 symbols:
11 - Server.socketHandler
12 derived_symbols:
13 - Server.Socket
Tatiana Bradley7c92a882023-05-08 13:11:54 -040014summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
Roland Shoemakereb069dd2021-07-15 13:05:23 -070015description: |
Julie Qiu04c3b9f2022-08-29 22:22:51 -040016 Web Sockets do not execute any AuthenticateMethod methods which may be set,
17 leading to a nil pointer dereference if the returned UserData pointer is
18 assumed to be non-nil, or authentication bypass.
19
20 This issue only affects WebSockets with an AuthenticateMethod hook.
21 Request handlers that do not explicitly use WebSockets are not
22 vulnerable.
Jonathan Amsterdam49ef6142022-02-10 08:53:15 -050023published: 2021-07-28T18:08:05Z
Tatiana Bradley0cf39702022-07-28 13:53:54 -040024ghsas:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040025 - GHSA-5gjg-jgh4-gppm
26 - GHSA-jpgg-cp2x-qrw3
Damien Neil00e94d72022-08-26 14:59:35 -070027references:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040028 - fix: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f
Damien Neilb5cb7652022-08-18 15:09:12 -070029cve_metadata:
30 id: CVE-2021-4236
31 cwe: 'CWE-400: Uncontrolled Resource Consumption'